Description: Cyber security IT Auditor Location: Austin, Texas ... and analyze evidence such as security policies, system configurations, logs, and ...
20 days ago
... , etc.).Define and enforce security standards (RBAC, Pod Security Standards, vulnerability scanning ...
22 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
22 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
22 days ago
Description: Advanced security project management experience, extensive experience ... augmentation contractors, including Two Network Security Analyst, and one
22 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
23 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
23 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
23 days ago
... Description As a member of the Security and Identity team, you will ... . It is fundamental to OCI's security posture and is a highly scalable ...
23 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and gove
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
26 days ago
... , with proven ability to assess security controls across networks, IAM, endpoint ... security, and incident response. Adept at ...
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. " Perform control ...
26 days ago
... with contractual, regulatory, and industry security standards. The role involves auditing ... : Review vendor contracts, SLAs, and security requirements for compliance. Audit technical ...
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
26 days ago
... auditing: Strong ability to evaluate security controls such as network protection ... , identity access management, endpoint security, and incident response across modern ...
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
26 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
26 days ago
... optimal performance, scalability, reliability, and security of HPC resources essential for ...
a day ago